Analyzing the Effectiveness of Phishing at Network Level
Sagar Mehta, Nitya Sundareswaran, Kevin D. Fairbanks, Nick Feamster
Analyzing the Effectiveness of Phishing at Network Level Sagar - - PowerPoint PPT Presentation
Analyzing the Effectiveness of Phishing at Network Level Sagar Mehta, Nitya Sundareswaran, Kevin D. Fairbanks, Nick Feamster Motivation Source - Phishing Activity Trends Report July, 2006 , Anti-Phishing workgroup Our work done from Jan
Sagar Mehta, Nitya Sundareswaran, Kevin D. Fairbanks, Nick Feamster
Querying script to map phishing domains to IP addresses Simulating HTTP client to follow redirects
Caveat
by directing queries to a foreign name server Extracted ip addresses to further query netflow data from GTRNOC to get netflow tuples using src ip, src port , dest ip, dest port as ‘key’
Interaction with known phishing Sites from PhishTank – wide varation in byte distribution even when interacting with sites imitating the same website
Similar variation in connection time distribution even when interacting with sites imitating the same website
How many unique phishing sites did a source address visit ?
How many times a connection was made to a phishing site ?
Connections made by diff src addresses to Bank of America phishing site – Observations in line with “persistent connection behavior of browsers” by wang et al
Bytes Percentage
Seconds Percentage
Bytes Percentage
Seconds Percentage